Abstract
Advances in wireless network technology and the continuously increasing users of Personal Trusted Device (PTD) make the latter an ideal channel for offering personalized services to mobile users. However, the current mobile transactions are not provided with the non-repudiated characteristics. In this paper, we propose a novel scheme in self-service store. We involve an “observer” to coordinate the transaction to overcome the computing resource weakness of the PTD. This research integrates some cryptology such as public key infrastructure, hashing chain and digital signature and so on. The proposed protocol meets the self-service store requirements such that fairness, non-repudiation, anonymity, efficient verification, simplicity and practicability issues can be guaranteed. On the basis of the PTD is more portable and personal than personal computer, it will be expected the more widely use in PTD applications. Our scheme will facilitate the mobile commerce prosperously, and will bring more commerce profits and more convenient to mobile user in our daily life.
Similar content being viewed by others
References
Asokan, N., Schunter, M., & Waidner, M. (1997). Optimistic protocols for fair exchange. In Proceedings 4th ACM Conference Computer Communication Security (pp. 6–17).
Asokan, N., Shoup, V., & Waidner, M. (1998). Asynchronous protocols for optimistic fair exchange. In Proceedings of the IEEE Symposium on Research in Security and Privacy (pp. 86–99).
Asokan N., Shoup V., Waidner M. (2000) Optimistic fair exchange of digital signatures. IEEE Journal on Selected Areas in Communications 18(4): 593–610. doi:10.1109/49.839935
Buttyan, L., & Hubaux, J. P. (1999). Accountable anonymous access to services in mobile communication systems. In Proceedings of the 18th IEEE Symposium on Reliable Distributed Systems(SRDS’99) (pp. 384–389) Workshop on Electronic Commerce.
Chen Y.Y., Chen C.L., Jan J.K. (2007) A mobile ticket system based on personal trusted device. Wireless Personal Communications 40(4): 569–578. doi:10.1007/s11277-006-9122-x
Chen Y.Y., Jan J.K., Chen C.L. (2005) A fair and secure mobile billing system. Computer Networks 48(4): 517–524. doi:10.1016/j.comnet.2004.10.011
Chen, C. L., Lin, H. Y., Chen, Y. Y., & Jan, J. K. (2006). A Fair Transaction Model in Mobile Commerce. In The 6th IEEE International Symposium on Signal Processing and Information Technology (ISSPIT 2006) (pp. 484–489). Vancouver, Canada, Aug. 27–30.
Coffey T., Saidha P. (1996) Non-repudiation with mandatory proof receipt. ACM SIGCOMM Computer Communication Review 26(1): 6–17. doi:10.1145/232335.232338
Cox, B., Tygar, J. D., & Sirbu, M. (1995). NetBill security and transaction protocol. In Proceedings of the First USENIX Workshop on Electronic Commerce(pp. 77–88).
Fujimura, K., & Nakajima, Y. (1998). General-purpose digital ticket framework. In 3rd USENIX Workshop on Electronic Commerce (pp.177–186). Boston, Massachusetts, August 31–September 3.
Grosche S.S., Knospe H. (2002) Secure mobile commerce. Electronics & Communication Engineering Journal 14(5): 228–238. doi:10.1049/ecej:20020506
Kremer S., Markowitch O., Zhou J. (2002) An intensive survey of fair non-repudiation protocols. Computer Communications 25: 1606–1607. doi:10.1016/S0140-3664(02)00049-X
Liew, C. C., Ng, W. K., Lim, E. P., Tan, B. S., & Ong, K. L.(1999), Non-repudiation in an agent-based electronic commerce system. In Proceedings of Database and Expert Systems Applications (pp. 864–868).
Mana, A., Martinez, J., Matamoros, S., & Troya, J. M. (2001). GSM-ticket: Generic secure mobile ticket service. In GEMPLUS Developer Conference(pp. 1–7), Paris, France.
MeT Ticketing Requirements. MeT Version 1.0. http://www.openmobilealliance.org/.
MeT Ticketing Framework Discussion Document. (2001). Mobile electronic. Transactions, 21. http://www.mobiletransaction.org/pdf/R11/MeT-Ticketing-Framework-R11.pdf..
MobileIN company. http://www.mobilein.com/ussd.htm. Accessed February 2007.
Patel, B., & Crowcroft, J. (1997). Ticket based service access for the mobile user. In Proceedings of the Third Annual ACM/IEEE International Conference on Mobile Computing and Networking (pp. 223–233), Budapest, Hungary.
Rabin M.O. (1983) Transaction protection by beacons. Journal of Computer and System Sciences 27(2): 256–267. doi:10.1016/0022-0000(83)90042-9
Tsalgatidou A., Pitoura E. (2001) Business models and transactions in mobile electronic commerce: Requirements and properties. Computer Networks 37(2): 221–236. doi:10.1016/S1389-1286(01)00216-X
Tsalgatidou, A., Veijalainen, J., Pitoura, E. (2000). Challenge in mobile electronic commerce. In Proceeding of IeC 2000, 3rd International Conference on Innovation through E-Commerce. UK, November 14th–16th.
Veijalainen J., Terziyan V., Tirri H. (2006) Transaction management for M-commerce at a mobile terminal. Electronic Commerce Research and Applications 5(3): 229–245. doi:10.1016/j.elerap.2005.10.010
Wang, H., Cao, J., & Zhang, Y. (2002), Ticket-based service scheme for mobile users. In The 25th Australian Computer Science Conference (ACSC2002), Melbourne, Australia. Conference in Research and Practice in Information Technology.
Wagner, D., & Schneier, B. (1996). Analysis of the SSL 3.0 protocol. In Proceedings of the Second USENIX Workshop on Electronic Commerce (pp. 29–40). USSENIX Press.
Wireless Transport Layer Security Specification. WAP-261-WTLS-20010406-a. URL: http://www.openmobilealliance.org/tech/affiliates/wap/wapindex.html. Accessed August 2007.
Zhang N., Shi Q. (1996) Achieving non-repudiation of receipt. The Computer Journal 39(10): 844–853. doi:10.1093/comjnl/39.10.844
Zhou, J., & Gollmann, D. (1996). A fair non-repudiation protocol. In Proceedings of 1996 IEEE Symposium on Security and Privacy (pp. 55–61), Oakland, California.
Zhou J., Gollmann D. (1997) Evidence and non-repudiation. Journal of Network and Computer Applications 20: 267–281. doi:10.1006/jnca.1997.0056
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Chen, CL., Chen, YY. A Non-repudiated Self-service Store System Based on Portable Trusted Device. Wireless Pers Commun 49, 475–485 (2009). https://doi.org/10.1007/s11277-008-9568-0
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11277-008-9568-0